CN114710324B - Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption - Google Patents

Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption Download PDF

Info

Publication number
CN114710324B
CN114710324B CN202210261919.0A CN202210261919A CN114710324B CN 114710324 B CN114710324 B CN 114710324B CN 202210261919 A CN202210261919 A CN 202210261919A CN 114710324 B CN114710324 B CN 114710324B
Authority
CN
China
Prior art keywords
codebook matrix
tunnel message
codebook
encryption
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210261919.0A
Other languages
Chinese (zh)
Other versions
CN114710324A (en
Inventor
任宇豪
芦伟
张晋
陈世伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Forward Industrial Co Ltd
Original Assignee
Shenzhen Forward Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Forward Industrial Co Ltd filed Critical Shenzhen Forward Industrial Co Ltd
Priority to CN202210261919.0A priority Critical patent/CN114710324B/en
Publication of CN114710324A publication Critical patent/CN114710324A/en
Application granted granted Critical
Publication of CN114710324B publication Critical patent/CN114710324B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Abstract

The invention discloses a cross-network tunnel message transmission method based on encryption and decryption by codebook replacement, which comprises the following steps: s1, generating a codebook matrix; s2, encrypting the data unit to be subjected to replacement encryption in the tunnel message by adopting a codebook matrix to obtain an encrypted tunnel message; s3, sending an encrypted tunnel message carrying the unique identification of the codebook matrix through an encrypting party; s4, receiving the tunnel message through a decryption party, and decrypting the encrypted tunnel message based on the unique identification of the codebook matrix; the invention solves the problem that the confidentiality of the cross-network data transmission can not be ensured when the cross-network communication is carried out through the N2N tunnel protocol.

Description

Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption
Technical Field
The invention relates to the technical field of data communication, in particular to a cross-network tunnel message transmission method based on encryption and decryption by codebook replacement.
Background
The private N2N tunnel protocol solves the problem of cross-network communication under the condition that routing isolation among different network systems and physical isolation are realized. However, in this scheme, the data is transmitted in a plaintext manner, and confidentiality of the cross-network data transmission cannot be guaranteed.
Disclosure of Invention
Aiming at the defects in the prior art, the cross-network tunnel message transmission method based on the encryption and decryption by the codebook substitution solves the problem that the confidentiality of cross-network data transmission cannot be guaranteed when the cross-network communication is carried out through an N2N tunnel protocol.
In order to achieve the aim of the invention, the invention adopts the following technical scheme: a cross-network tunnel message transmission method based on encryption and decryption of codebook replacement comprises the following steps:
s1, generating a codebook matrix;
s2, encrypting the data unit to be subjected to replacement encryption in the tunnel message by adopting a codebook matrix to obtain an encrypted tunnel message;
s3, sending an encrypted tunnel message carrying the unique identification of the codebook matrix through an encrypting party;
s4, receiving the tunnel message through the decryption party, and decrypting the encrypted tunnel message based on the unique identification of the codebook matrix.
Further, in the step S1, the codebook matrix has an order of n, n=2 m ,m>The codebook matrix of order n=1, comprising 0 to 2 n All data of-1, m being an integer.
Further, in the step S1, after the codebook matrix is generated, the codebook matrix is updated by adopting the first-class line change and the first-class column change, and when a new codebook matrix is generated, a unique identifier of the corresponding codebook matrix is generated.
The beneficial effects of the above-mentioned further scheme are: the corresponding codebook matrix can be determined through the unique identifier of the codebook matrix, so that the data encryption and decryption processes of the two parties are ensured to be normal.
Further, the unique identification of the codebook matrix is an MD5 value.
The beneficial effects of the above-mentioned further scheme are: and taking the MD5 value of the codebook matrix as a unique identifier of the codebook matrix, and carrying the MD5 value in a tunnel message by an encryptor when cross-network tunnel transmission is performed so that a receiver can select the correct codebook matrix for decryption through the MD5 value.
Further, the step S2 includes the following sub-steps:
s21, acquiring a data unit to be replaced and encrypted in a tunnel message;
s22, finding the coordinates of the data unit in the codebook matrix;
s23, calculating a replaced unit according to the coordinates of the data unit in the codebook matrix;
s24, replacing the data unit in the tunnel message by the replaced unit to obtain the encrypted tunnel message.
Further, the formula for calculating the replaced unit in step S23 is as follows:
M=(X<<(n/2))|Y
wherein M is a replaced unit, X is the abscissa of the data unit in the codebook matrix, Y is the ordinate of the data unit in the codebook matrix, n is the order of the codebook matrix, < < left shift, | is OR operation.
Further, the step S4 includes the following sub-steps:
s41, receiving the tunnel message through a decryption party;
s42, finding out a corresponding codebook matrix according to the unique identifier of the codebook matrix carried in the tunnel message;
s43, calculating coordinates of the data unit used for encryption in the corresponding codebook matrix according to the corresponding codebook matrix order and the replaced unit;
s44, restoring the replaced unit into the data unit according to the calculated coordinates of the data unit for encryption in the corresponding codebook matrix.
In summary, the invention has the following beneficial effects:
(1) The invention uses the prefabricated and timing updated cipher-book matrix to make replacement encryption to the original business data transmitted across the network, so as to achieve the purposes of hiding the original business data and protecting the safety of the business data across the network.
(2) The invention can reduce the performance loss in the traditional encryption, avoid the leakage of the codebook caused by the transmission of the codebook on the network, and effectively reduce the risk of the codebook being broken by updating the codebook at regular time. The safety and the forwarding performance of cross-network tunnel transmission are greatly enhanced.
Drawings
Fig. 1 is a flowchart of a cross-network tunnel message transmission method based on encryption and decryption by codebook replacement.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and all the inventions which make use of the inventive concept are protected by the spirit and scope of the present invention as defined and defined in the appended claims to those skilled in the art.
As shown in fig. 1, a method for transmitting a cross-network tunnel message based on encryption and decryption by codebook replacement comprises the following steps:
s1, generating a codebook matrix;
the codebook matrix in step S1 has an order of n, n=2 m ,m>The codebook matrix of order n=1, comprising 0 to 2 n All data of-1, m is an integer and n is an even number. For example, n=16, 256, 65536, etc., where n=16, the codebook matrix has a size of 16×16, and the codebook matrix of 16×16 can replace 1 byte of data; when n=256, the size of the codebook matrix is 256×256, and the codebook matrix of 256×256 can replace 2 bytes of data; when n=65536, the codebook matrix with the size of 65536×65536, 65536×65536 can replace 4 bytes of data.
Taking a 16 x 16 cipher matrix as an example, table 1 below shows. The horizontal axis is denoted by X, the vertical axis is denoted by Y, and (X, Y) may represent a number in the codebook matrix.
TABLE 1
In step S1, after the codebook matrix is generated, dynamic updating is performed, the codebook matrix is updated by adopting primary row change and primary column change, the times of the primary row change and the primary column change are set according to the security condition, and the primary row change and the primary column change are performed for a plurality of times, so that the security can be further improved, and when a new codebook matrix is generated, a unique identifier of the corresponding codebook matrix is generated. The unique identification of the codebook matrix is the MD5 value.
The data in the codebook matrix are all represented by hexadecimal numbers, and the generated codebook matrix needs to completely represent all the data of the data unit. According to the size of the replaced data, the order of the codebook matrix is determined, if the size of the data unit is 1 byte, the codebook matrix with the size of 16×16 needs to contain all data from 0 to FF, so it is known that the codebook matrix with the size of 16×16 is a subset of the codebook matrix with the size of 256×256, and the codebook matrix with the size of 256×256 is also a subset of the codebook matrix with the size of 65536×65536.
The data in the codebook matrix can be arranged randomly, so that the randomness of the codebook matrix is enhanced, the possibility of cracking the codebook is reduced, and the security of the encryption method is improved.
In order to avoid generating the codebook matrix in the process of cross-network data forwarding, the codebook matrix can be pre-generated according to different constants m specified by data units with different sizes in the process of system initialization.
The encryption and decryption parties should follow the same rule when generating the codebook matrix, and the encryption and decryption parties synchronously carry out when updating, so as to ensure the uniformity of the codebook matrix and ensure the normal operation of encryption and decryption.
After the codebook matrix for substitution encryption is determined, the size of the substituted unit is determined to be n/2bit, the data length to be encrypted is ensured to be integer times of the size of the substituted unit according to the size of the substituted unit, and the encrypted data is required to be filled when the data is insufficient, and the filling data length is 0-n/2-1.
S2, encrypting the data unit to be subjected to replacement encryption in the tunnel message by adopting a codebook matrix to obtain an encrypted tunnel message;
step S2 comprises the following sub-steps:
s21, acquiring a data unit to be replaced and encrypted in a tunnel message;
s22, finding the coordinates of the data unit in the codebook matrix;
s23, calculating a replaced unit according to the coordinates of the data unit in the codebook matrix;
the formula for calculating the replaced unit in step S23 is:
M=(X<<(n/2))|Y
wherein M is a replaced unit, X is the abscissa of the data unit in the codebook matrix, Y is the ordinate of the data unit in the codebook matrix, n is the order of the codebook matrix, < < left shift, | is OR operation.
S24, replacing the data unit in the tunnel message by the replaced unit to obtain the encrypted tunnel message.
When a plurality of data units needing to be encrypted exist in the tunnel message, repeating the steps S21 to S24, and transmitting the data units to a decryption party after all the data units in the tunnel message are encrypted.
S3, sending an encrypted tunnel message carrying the unique identification of the codebook matrix through an encrypting party;
the specific implementation manner of the step S3 is as follows: the unique identification of the codebook matrix is written into the encrypted tunnel message.
S4, receiving the tunnel message through the decryption party, and decrypting the encrypted tunnel message based on the unique identification of the codebook matrix.
The step S4 includes the following sub-steps:
s41, receiving the tunnel message through a decryption party;
s42, finding out a corresponding codebook matrix according to the unique identifier of the codebook matrix carried in the tunnel message;
s43, calculating coordinates of the data unit used for encryption in the corresponding codebook matrix according to the corresponding codebook matrix order and the replaced unit;
s44, restoring the replaced unit into the data unit according to the calculated coordinates of the data unit for encryption in the corresponding codebook matrix.
After decryption in step S44, if the data is padded during encryption, the padded data must be stripped after decryption.
Take a cross-domain security gateway as an example. The security gateway isolates the terminal route of different network domains, controls the terminal user to access the network, and realizes the data intercommunication among different network domains by exchanging the cross-network tunnel messages among different service processing units.
When the device is initialized, a first 16 x 16 codebook matrix is generated, when the 16 x 16 codebook matrix is updated, four row transformations are performed first, and four column transformations are performed again, so that a new 16 x 16 codebook matrix is obtained, as shown in table 2.
Four-line transformation is as follows:r0, r1, r2, r3, r4, r5, r6, r7 are in order row 1, row 2, row 3, row 4, row 5, row 6, row 7, < >>For exchange.
Four column transforms are:the c0, c1, c2, c3, c4, c5, c6, and c7 are the 1 st, 2 nd, 3 rd, 4 th, 5 th, 6 th, and 7 th columns in order.
TABLE 2
When the codebook matrix expires, the codebook matrix needs to be updated again, and the kth time is used for performing four-time line transformation on the codebook matrix, as follows:r represents a row. When the subscript in the line transformation is larger than the order n of the codebook matrix, taking the remainder of n as the subscript.
Then 4 column transforms are performed as follows: c represents column->For the kth column with the 1+k column. When the subscript in column transformation is larger than the order n of the codebook matrix, taking the remainder of n as the subscript
The data unit to be replaced and encrypted in the tunnel message is: 0x12 0x34 0x56 0x78 0x90. Encrypting the data unit by using an encryption method of S2 to obtain a replaced unit: 0x2e 0x4c 0x6a 0x88 0x06.

Claims (4)

1. A cross-network tunnel message transmission method based on encryption and decryption of codebook replacement is characterized by comprising the following steps:
s1, generating a codebook matrix;
s2, encrypting the data unit to be subjected to replacement encryption in the tunnel message by adopting a codebook matrix to obtain an encrypted tunnel message;
s3, sending an encrypted tunnel message carrying the unique identification of the codebook matrix through an encrypting party;
s4, receiving the tunnel message through a decryption party, and decrypting the encrypted tunnel message based on the unique identification of the codebook matrix;
the step S2 comprises the following sub-steps:
s21, acquiring a data unit to be replaced and encrypted in a tunnel message;
s22, finding the coordinates of the data unit in the codebook matrix;
s23, calculating a replaced unit according to the coordinates of the data unit in the codebook matrix;
s24, replacing the data unit in the tunnel message by the replaced unit to obtain an encrypted tunnel message;
the formula for calculating the replaced unit in step S23 is:
M=(X<<(n/2))|Y
wherein M is a replaced unit, X is the abscissa of the data unit in the codebook matrix, Y is the ordinate of the data unit in the codebook matrix, n is the order of the codebook matrix, < < left shift, |OR operation;
the step S4 includes the following sub-steps:
s41, receiving the tunnel message through a decryption party;
s42, finding out a corresponding codebook matrix according to the unique identifier of the codebook matrix carried in the tunnel message;
s43, calculating coordinates of the data unit used for encryption in the corresponding codebook matrix according to the corresponding codebook matrix order and the replaced unit;
s44, restoring the replaced unit into the data unit according to the calculated coordinates of the data unit for encryption in the corresponding codebook matrix.
2. The method for transmitting the cross-network tunnel message based on the codebook replacement encryption and decryption according to claim 1, wherein the order of the codebook matrix in the step S1 is n-order, n=2 m ,m>The codebook matrix of order n=1, comprising 0 to 2 n All data of-1, m being an integer.
3. The method for transmitting the cross-network tunnel message based on the encryption and decryption of the codebook displacement according to claim 1, wherein in the step S1, after the codebook matrix is generated, the codebook matrix is updated by adopting the first-class line change and the first-class column change, and when a new codebook matrix is generated, a unique identifier of the corresponding codebook matrix is generated.
4. The method for transmitting the cross-network tunnel message based on the encryption and decryption of the codebook displacement according to claim 3, wherein the unique identifier of the codebook matrix is an MD5 value.
CN202210261919.0A 2022-03-16 2022-03-16 Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption Active CN114710324B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210261919.0A CN114710324B (en) 2022-03-16 2022-03-16 Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210261919.0A CN114710324B (en) 2022-03-16 2022-03-16 Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption

Publications (2)

Publication Number Publication Date
CN114710324A CN114710324A (en) 2022-07-05
CN114710324B true CN114710324B (en) 2024-02-13

Family

ID=82168425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210261919.0A Active CN114710324B (en) 2022-03-16 2022-03-16 Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption

Country Status (1)

Country Link
CN (1) CN114710324B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5295188A (en) * 1991-04-04 1994-03-15 Wilson William J Public key encryption and decryption circuitry and method
WO2007075154A2 (en) * 2004-12-06 2007-07-05 The Trustees Of The Stevens Institute Of Technology Method and apparatus for maintaining data integrity for block-encryption algorithms
CN106921485A (en) * 2015-12-24 2017-07-04 航天信息股份有限公司 Encrypting and decrypting method based on matrix operation
CN107277048A (en) * 2017-07-26 2017-10-20 浙江吉利汽车研究院有限公司 A kind of encrypting and decrypting method for communication authentication
CN107786327A (en) * 2016-08-31 2018-03-09 电子科技大学 A kind of safe and reliable transmission method based on LDPC code
CN108011708A (en) * 2016-10-28 2018-05-08 长城汽车股份有限公司 The controller and vehicle of message encryption method, vehicle based on automobile bus
CN108388808A (en) * 2018-03-05 2018-08-10 郑州轻工业学院 Image encryption method based on Xi Er encryption and dynamic DNA encoding
CN109462469A (en) * 2018-11-13 2019-03-12 常熟理工学院 Based on arrangement and displaced network flow-medium information security encryption method and system
CN110535748A (en) * 2019-09-09 2019-12-03 北京科东电力控制系统有限责任公司 A kind of vpn tunneling model-based optimization method and system
CN112235112A (en) * 2020-09-03 2021-01-15 中国电子科技集团公司第三十研究所 Zero-semantic and one-time pad-based IP encryption method, system and storage medium
CN113225311A (en) * 2021-03-24 2021-08-06 深圳市风云实业有限公司 Cross-network tunnel transmission method based on identity

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5295188A (en) * 1991-04-04 1994-03-15 Wilson William J Public key encryption and decryption circuitry and method
WO2007075154A2 (en) * 2004-12-06 2007-07-05 The Trustees Of The Stevens Institute Of Technology Method and apparatus for maintaining data integrity for block-encryption algorithms
CN106921485A (en) * 2015-12-24 2017-07-04 航天信息股份有限公司 Encrypting and decrypting method based on matrix operation
CN107786327A (en) * 2016-08-31 2018-03-09 电子科技大学 A kind of safe and reliable transmission method based on LDPC code
CN108011708A (en) * 2016-10-28 2018-05-08 长城汽车股份有限公司 The controller and vehicle of message encryption method, vehicle based on automobile bus
CN107277048A (en) * 2017-07-26 2017-10-20 浙江吉利汽车研究院有限公司 A kind of encrypting and decrypting method for communication authentication
CN108388808A (en) * 2018-03-05 2018-08-10 郑州轻工业学院 Image encryption method based on Xi Er encryption and dynamic DNA encoding
CN109462469A (en) * 2018-11-13 2019-03-12 常熟理工学院 Based on arrangement and displaced network flow-medium information security encryption method and system
CN110535748A (en) * 2019-09-09 2019-12-03 北京科东电力控制系统有限责任公司 A kind of vpn tunneling model-based optimization method and system
CN112235112A (en) * 2020-09-03 2021-01-15 中国电子科技集团公司第三十研究所 Zero-semantic and one-time pad-based IP encryption method, system and storage medium
CN113225311A (en) * 2021-03-24 2021-08-06 深圳市风云实业有限公司 Cross-network tunnel transmission method based on identity

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Jun Wang ; Xiangcheng Zhi ; Xiuli Chai ; Yang Lu .Chaos-based image encryption strategy based on random number embedding and DNA-level self-adaptive permutation and diffusion.《Multimedia Tools and Applications》.2021,第第80卷卷16087–16122页. *
基于ZUC与DWT-SVD的交换加密水印算法;赵培越; 张珍珍; 李祯祯; 丁海洋; 李子臣;《计算机应用研究》;第第38卷卷(第第11期期);3423-3427页 *

Also Published As

Publication number Publication date
CN114710324A (en) 2022-07-05

Similar Documents

Publication Publication Date Title
RU2737917C1 (en) Ambiguity increase
US9698979B2 (en) QKD key management system
CN110852745A (en) Block chain distributed dynamic network key automatic updating method
EP3476078A1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN103067166A (en) Grading mixing encryption method and device of intelligent family system
CN102238430A (en) Personalized whitebox descramblers
US9686249B2 (en) Multi-node encryption
CN113595717B (en) ECB mode packet encryption method and decryption method, control device and vehicle
CN104618387A (en) Method applying SIP signaling to quantum secure communication system, integrated access quantum gateway and system
CN109218013A (en) Cover the binary data communication encryption method on plaintext symbol boundary
CN108270553A (en) Credible repeater, the key encryption method of quantum communication network, device, system
CN114710324B (en) Cross-network tunnel message transmission method based on cipher-key replacement encryption and decryption
US20200236092A1 (en) Transencrypting method and apparatus for removing information from data transmitted over networks and stored in data storage facilities
CN101499898A (en) Method and apparatus for cipher key interaction
CN114401148A (en) Communication data encryption and decryption optimization method
AU2012311701B2 (en) System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers
CN111639943A (en) Digital currency transaction method and system
JP2010068396A (en) Cryptographic device, terminal device, cryptographic program and method and program and method for processing information
AU2019381522A1 (en) Encryption system and method employing permutation group-based encryption technology
CN110278206B (en) BWE encryption algorithm based on double private keys
CN101237461A (en) Stream encryption and decryption method and device
CN112333700A (en) Session encryption transmission method, device and system
CN111901101A (en) Key updating method and system
CN116614236A (en) Key management method, device, equipment and storage medium
CN117335995A (en) ECDH-based third party-free public key authentication encryption and decryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant